Cybersecurity Personally Identifiable Information

Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and... more +
Cybersecurity is a term used to describe methods and systems for protecting sensitive information in the electronic sphere. As more financial, business, and personal information becomes exclusively maintained and stored electronically, the risks of attacks, leaks, and disclosures become more pronouced. The concept of Cybersecurity encompasses a broad array of issues, including governmental regulations to ward off cyber terrorists, industry data collection and maintenance practices, and consumer advocacy to ensure the privacy of individuals' personal and medical information.     less -
News & Analysis as of

Beyond Breach: Challenges in Cybersecurity & Coverage

Some of the biggest threats to cybersecurity involve controlling, damaging and interrupting systems, denying access to critical data and destroying data; “breach” not so much. Organizations need to make sure that their...more

Data Breaches: Are You Ready (for the inevitable)?

In 2015, identity theft occurred every two seconds, disrupting the lives of 13.1 million people, according to Javelin Strategy and Research. Year after year, U.S. data breaches have hit record highs, reports the Identity...more

Employee Data Security: Perquisite or Prerequisite?

One of the many costs of doing business in this day and age is the threat of a data breach. In the past several years data breach incidents have occurred with increasing frequency. From Target to eBay and Sony to Ashley...more

Rocky Mountain Securities Conference: Cybersecurity Takes Center Stage

Given the security industry’s increased use of information technology and the constant evolution of cyber threats, cybersecurity will continue to demand significant attention from regulators and industry participants in the...more

New Study confirms that 9 out of 10 businesses have experienced a hacking incident in the last year

Hartford Steam Boiler released a study on May 17, 2016, that states that nine out of ten businesses have experienced at least one hacking incident in the past year, which represents a 21 percent increase since 2014....more

Continuing Data Security Lessons from the SEC

In September, we reported that the Securities and Exchange Commission (SEC) settled charges against a registered investment adviser for a violation of Rule 30(a) of Regulation S-P (17 C.F.R. 248.30(a))(“Safeguards Rule”) for...more

Employers Face Exposure for Cyberbreaches

A newly filed lawsuit in California and a recent decision from the U.S. Court of Appeals for the Seventh Circuit serve as reminders to employers that the protection of sensitive employee information from cyberthreats remains...more

Tennessee Gives Businesses 45 Days for Data Breach Notice

Recent amendments to the State’s data breach statute give a hard deadline for a business to provide consumer notice, removes encryption safe harbor, exempts entities that are subject to the Health Insurance Portability and...more

Cybersecurity Compliance Just Got Tougher

Companies need specific, well-executed plans to meet growing demands of federal and state agencies. While cybersecurity risks have increased, government regulation has traditionally lagged behind. Recently, some...more

O’ Really, Canada? Data Breach Log Rules Underway

In June 2015, Canada made significant amendments to its data privacy law, the Personal Information Protection and Electronic Documents Act (PIPEDA).  These amendments to PIPEDA will require businesses to inform the Canadian...more

Sony settles employees’ class action suit for up to $8M

The Sony data breach in 2014 was one of the most significant breaches experienced and was a first on many fronts. It was alleged to have been caused by North Korean hackers (calling themselves Guardians of Peace) seeking to...more

Feds identify security vulnerabilities in state healthcare exchange websites

A Government Accountability Office (GAO) examination of the state-run health insurance exchanges for California, Kentucky and Vermont identified inadequate security measures in place to protect consumers’ personal...more

They Can Be Heroes: The FCC Proposes Expansive and Detailed Privacy & Cybersecurity Regulations for Broadband ISP

On April 1, 2016, the FCC released a Notice of Proposed Rulemaking (“NPRM”) that would impose new regulatory burdens on broadband Internet service providers’ use of customer data. The wide-ranging NPRM also proposes rules...more

2016 Data Breach Litigation Report

Data security breaches – and data security breach litigation – dominated the headlines in 2015 and continue to do so in 2016. Continuous widely publicized breaches have led to 30,000 articles a month being published that...more

Preparing For and Responding To Data Breaches (Presentation)

While companies may be aware of the threats posed to their businesses by a data breach, they should also have a concrete plan in place so that they can respond effectively should one occur. In a recent webinar, attorneys from...more

Cyber Security IMPOSSIBLE: California AG Decides a Ceiling is a Floor

We all know why selecting appropriate data security standards is difficult. No two business are the same. Different businesses have different assets to protect and different bank accounts to tap. Different sized businesses...more

State Data Security Breach Notification Laws - April 2016

The general definition of “personal information” used in the majority of statutes is: An individual’s first name or first initial and last name plus one or more of the following data elements: (i) Social Security number, (ii)...more

Tennessee Revamps Its State Data Breach Notification Statute

Effective July 1, 2016, Tennessee amended its data breach notification statute to require notification of a data breach to affected individuals regardless of whether the personal information involved in the security incident...more

[Webinar] Got Data? Analytics to the Rescue - April 19th, 12:00pm CDT

Within an enterprise, data is a dual-edged sword – it’s both the lifeblood powering critical business operations and the kryptonite preventing the business from flexing its muscle. When investigations, litigation or...more

Information Security and Privacy Group News: Cybersecurity Conference Essential Take-Aways Government, Industry and Legal...

Representatives of Connecticut businesses and corporations, educational institutions, and state and local government attended Murtha Cullina’s March 2016 Cybersecurity Conference at the Quinnipiac University School of Law....more

Missing laptop returned after Premier Healthcare reports data breach of 205,748 patients

Premier Healthcare, a multi-specialty group located in Bloomington, Illinois, announced in early March that an unencrypted laptop has been missing from its billing department since early January and started notifying affected...more

FDIC Publishes Special Edition of Quarterly Consumer News: A Bank Customer’s Guide to Cybersecurity

On March 8, the FDIC published a special edition of its Quarterly Consumer News entitled, “A Bank Customer’s Guide to Cybersecurity.” The guide provides consumers with, among other things, (i) safety tips for online banking;...more

Protect Your Employees’ Personal Information or You’re Putting Your Business at Risk

For the past few years, data breaches have made news headlines and raised awareness for data privacy and cybersecurity. Some of the most well publicized data breach stories have been the breaches of Sony, Target, Home Depot,...more

CFPB Announces First Ever Data Security Enforcement Action

On March 2, 2016, the Consumer Financial Protection Bureau (CFPB) announced its first data security related enforcement action against online payment systems company Dwolla, Inc. ...more

Privacy & Cybersecurity Update - January 2016

In this edition of our Privacy & Cybersecurity Update, we discuss, among other matters, the status of the EU/U.S. Safe Harbor negotiations, as well as changes to privacy laws in Delaware and California that regulate online...more

352 Results
|
View per page
Page: of 15
JD Supra Readers' Choice 2016 Awards

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:

Sign up to create your digest using LinkedIn*

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.

Already signed up? Log in here

*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.
×